Featured Blogs

Featured Articles

  • Multicore Q&A with LDRA

    Not just for plants, cross-pollination applies to know-how, too, and there may be no better example than what’s taking place among the mil-aero, medical, industrial and other markets as they seek to take on the complexities of security and safety for multicore systems.

  • Security: The Ultimate Barrier to IoT Success

    Coming to a meeting of minds on security, independent portability and virtualization will pave the way for IoT success.

  • Cortus IP connects the third wave of computational devices

    Two 32bit processor IPs have been released by Cortus, the company’s second generation of processor IP that takes a minimalist approach to the ‘third wave’ of applications. Caroline Hayes spoke to Roddy Urqhart, Vice President Sales & Marketing, Cortus.

  • Building Security In: Tools and Techniques for Reducing Software Vulnerabilities

    By definition secure software is high-quality software, but the reverse is not always true.

  • IoT Standards Enable Interoperability

    Experts weigh in on challenges in IoT device development, the value of standards, and the importance of standards groups such as the Industrial Internet Consortium.

  • A 3-Tier Approach to IoT Security

    To ensure the functionality of an IOT system, software designers should consider a 3-tiered stack of controls, where the lowest level ensures the integrity of the next.

  • Smarter Ways to Embrace the Internet of Things

    Business benefits have been constrained by the complexity of producing real-world applications, but this will change once operators and device manufacturers are freed to focus on their value-add.

  • Smart Software Monetization for Smart Devices

    Equipment manufacturers are evolving into software companies. The right software monetization tactics offer greater market share while reducing manufacturing and inventory costs.

  • Security in the Connected Car

    Connected, safe and reliable – this is the vision for the car of the future. To make sure these three requirements can be met, vehicle manufacturers, suppliers of electronic components

  • Security Measures for Internet Enabled Devices

    Increased reliance on intelligent devices and a growing number of threats require proactive security measures. Embedded devices, including Military and Aerospace devices, is the

EECatalog on Facebook

Featured Product Briefs

  • Iconfidant SSH & SSL

    Iconfidant SSH & SSL are source code products providing embedded security for VxWorks, Solaris and Linux based systems. Iconfidant allows network equipment vendors to easily add

  • Floodgate Packet Filter - Embedded Firewall

    Floodgate Packet Filter is an embedded firewall that allows networked devices to control the packets they process. Floodgate protects against potentially malicious attacks by filtering

  • 6WINDGate Multicore Packet Processing Software

    Compatible Architectures: Cavium OCTEON/OCETON-II, Freescale QorIQ, Intel® x86, NetLogic XLR/XLS/XLP, Tilera TilePro64 6WINDGate™ is the Gold Standard in packet processing software

Wind River Datasheet Directory